Analysis
-
max time kernel
147s -
max time network
166s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
11-10-2023 14:13
Behavioral task
behavioral1
Sample
a86647b6fae82a1e4cd9344fc4ce634c013f7deb0afba0a6a92b475f9da29f59.exe
Resource
win7-20230831-en
General
-
Target
a86647b6fae82a1e4cd9344fc4ce634c013f7deb0afba0a6a92b475f9da29f59.exe
-
Size
239KB
-
MD5
bd587a0b585165344d260012871e1f30
-
SHA1
9bd92efd55b61b8d12c8d910a2a71aee125aa6cd
-
SHA256
a86647b6fae82a1e4cd9344fc4ce634c013f7deb0afba0a6a92b475f9da29f59
-
SHA512
791a5a938ab6ec4553d2cdf3f7f9a7154311a94c5ea055ea36c3418f26aaacc89b2ea0e203085a4c9f57d380daad1465d9f0a3ef6b6a3830abb0bd3c27ddad7e
-
SSDEEP
6144:V7Vj3uVUn27+6qQx41QPF2nnugMeS2SpY:xwYfQx9FOnugMeS2
Malware Config
Extracted
amadey
3.89
http://77.91.68.52/mac/index.php
-
install_dir
fefffe8cea
-
install_file
explonde.exe
-
strings_key
916aae73606d7a9e02a1d3b47c199688
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000\Control Panel\International\Geo\Nation a86647b6fae82a1e4cd9344fc4ce634c013f7deb0afba0a6a92b475f9da29f59.exe Key value queried \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000\Control Panel\International\Geo\Nation explonde.exe -
Executes dropped EXE 1 IoCs
pid Process 3444 explonde.exe -
Loads dropped DLL 1 IoCs
pid Process 3624 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2320 schtasks.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 1124 wrote to memory of 3444 1124 a86647b6fae82a1e4cd9344fc4ce634c013f7deb0afba0a6a92b475f9da29f59.exe 89 PID 1124 wrote to memory of 3444 1124 a86647b6fae82a1e4cd9344fc4ce634c013f7deb0afba0a6a92b475f9da29f59.exe 89 PID 1124 wrote to memory of 3444 1124 a86647b6fae82a1e4cd9344fc4ce634c013f7deb0afba0a6a92b475f9da29f59.exe 89 PID 3444 wrote to memory of 2320 3444 explonde.exe 90 PID 3444 wrote to memory of 2320 3444 explonde.exe 90 PID 3444 wrote to memory of 2320 3444 explonde.exe 90 PID 3444 wrote to memory of 4516 3444 explonde.exe 92 PID 3444 wrote to memory of 4516 3444 explonde.exe 92 PID 3444 wrote to memory of 4516 3444 explonde.exe 92 PID 4516 wrote to memory of 1532 4516 cmd.exe 95 PID 4516 wrote to memory of 1532 4516 cmd.exe 95 PID 4516 wrote to memory of 1532 4516 cmd.exe 95 PID 4516 wrote to memory of 1288 4516 cmd.exe 96 PID 4516 wrote to memory of 1288 4516 cmd.exe 96 PID 4516 wrote to memory of 1288 4516 cmd.exe 96 PID 4516 wrote to memory of 5104 4516 cmd.exe 97 PID 4516 wrote to memory of 5104 4516 cmd.exe 97 PID 4516 wrote to memory of 5104 4516 cmd.exe 97 PID 4516 wrote to memory of 1216 4516 cmd.exe 98 PID 4516 wrote to memory of 1216 4516 cmd.exe 98 PID 4516 wrote to memory of 1216 4516 cmd.exe 98 PID 4516 wrote to memory of 1912 4516 cmd.exe 99 PID 4516 wrote to memory of 1912 4516 cmd.exe 99 PID 4516 wrote to memory of 1912 4516 cmd.exe 99 PID 4516 wrote to memory of 3612 4516 cmd.exe 100 PID 4516 wrote to memory of 3612 4516 cmd.exe 100 PID 4516 wrote to memory of 3612 4516 cmd.exe 100 PID 3444 wrote to memory of 3624 3444 explonde.exe 111 PID 3444 wrote to memory of 3624 3444 explonde.exe 111 PID 3444 wrote to memory of 3624 3444 explonde.exe 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\a86647b6fae82a1e4cd9344fc4ce634c013f7deb0afba0a6a92b475f9da29f59.exe"C:\Users\Admin\AppData\Local\Temp\a86647b6fae82a1e4cd9344fc4ce634c013f7deb0afba0a6a92b475f9da29f59.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1124 -
C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe"C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3444 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN explonde.exe /TR "C:\Users\Admin\AppData\Local\Temp\fefffe8cea\explonde.exe" /F3⤵
- Creates scheduled task(s)
PID:2320
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k echo Y|CACLS "explonde.exe" /P "Admin:N"&&CACLS "explonde.exe" /P "Admin:R" /E&&echo Y|CACLS "..\fefffe8cea" /P "Admin:N"&&CACLS "..\fefffe8cea" /P "Admin:R" /E&&Exit3⤵
- Suspicious use of WriteProcessMemory
PID:4516 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:1532
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explonde.exe" /P "Admin:N"4⤵PID:1288
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "explonde.exe" /P "Admin:R" /E4⤵PID:5104
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo Y"4⤵PID:1216
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:N"4⤵PID:1912
-
-
C:\Windows\SysWOW64\cacls.exeCACLS "..\fefffe8cea" /P "Admin:R" /E4⤵PID:3612
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\006700e5a2ab05\clip64.dll, Main3⤵
- Loads dropped DLL
PID:3624
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
239KB
MD5bd587a0b585165344d260012871e1f30
SHA19bd92efd55b61b8d12c8d910a2a71aee125aa6cd
SHA256a86647b6fae82a1e4cd9344fc4ce634c013f7deb0afba0a6a92b475f9da29f59
SHA512791a5a938ab6ec4553d2cdf3f7f9a7154311a94c5ea055ea36c3418f26aaacc89b2ea0e203085a4c9f57d380daad1465d9f0a3ef6b6a3830abb0bd3c27ddad7e
-
Filesize
239KB
MD5bd587a0b585165344d260012871e1f30
SHA19bd92efd55b61b8d12c8d910a2a71aee125aa6cd
SHA256a86647b6fae82a1e4cd9344fc4ce634c013f7deb0afba0a6a92b475f9da29f59
SHA512791a5a938ab6ec4553d2cdf3f7f9a7154311a94c5ea055ea36c3418f26aaacc89b2ea0e203085a4c9f57d380daad1465d9f0a3ef6b6a3830abb0bd3c27ddad7e
-
Filesize
239KB
MD5bd587a0b585165344d260012871e1f30
SHA19bd92efd55b61b8d12c8d910a2a71aee125aa6cd
SHA256a86647b6fae82a1e4cd9344fc4ce634c013f7deb0afba0a6a92b475f9da29f59
SHA512791a5a938ab6ec4553d2cdf3f7f9a7154311a94c5ea055ea36c3418f26aaacc89b2ea0e203085a4c9f57d380daad1465d9f0a3ef6b6a3830abb0bd3c27ddad7e
-
Filesize
89KB
MD52ac6d3fcf6913b1a1ac100407e97fccb
SHA1809f7d4ed348951b79745074487956255d1d0a9a
SHA25630f0f0631054f194553a9b8700f2db747cb167490201a43c0767644d77870dbe
SHA51279ebf87dccce1a0b7f892473dfb1c0bff5908840e80bbda44235a7a568993a76b661b81db6597798ec6e978dc441dd7108583367ffdc57224e40d0bd0efe93b6
-
Filesize
89KB
MD52ac6d3fcf6913b1a1ac100407e97fccb
SHA1809f7d4ed348951b79745074487956255d1d0a9a
SHA25630f0f0631054f194553a9b8700f2db747cb167490201a43c0767644d77870dbe
SHA51279ebf87dccce1a0b7f892473dfb1c0bff5908840e80bbda44235a7a568993a76b661b81db6597798ec6e978dc441dd7108583367ffdc57224e40d0bd0efe93b6
-
Filesize
89KB
MD52ac6d3fcf6913b1a1ac100407e97fccb
SHA1809f7d4ed348951b79745074487956255d1d0a9a
SHA25630f0f0631054f194553a9b8700f2db747cb167490201a43c0767644d77870dbe
SHA51279ebf87dccce1a0b7f892473dfb1c0bff5908840e80bbda44235a7a568993a76b661b81db6597798ec6e978dc441dd7108583367ffdc57224e40d0bd0efe93b6
-
Filesize
273B
MD50c459e65bcc6d38574f0c0d63a87088a
SHA141e53d5f2b3e7ca859b842a1c7b677e0847e6d65
SHA256871c61d5f7051d6ddcf787e92e92d9c7e36747e64ea17b8cffccac549196abc4
SHA512be1ca1fa525dfea57bc14ba41d25fb904c8e4c1d5cb4a5981d3173143620fb8e08277c0dfc2287b792e365871cc6805034377060a84cfef81969cd3d3ba8f90d